Abstract
Security documents (currency, treasury bills, stocks, bonds, birth certificates, etc.) provide an interesting problem space for investigating information hiding. Recent advances in the quality of consumer printers and scanners have allowed the application of traditional information hiding techniques to printed materials. This paper explores how some of those techniques might be used to address the problem of counterfeiting as the capability of home printers to produce “exact” copies improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
E. Adelson, Digital Signal Encoding and Decoding Apparatus, U.S. Patent No. 4,939,515 1990.
D. L. Hecht, “Embedded Data Glyph Technology for Hardcopy Digital Documents,” SPIE 2171 1995.
K. Matsui and K. Tanaka, “Video-Steganography: How to Secretly Embed a Signature in a Picture,” IMA Intellectual Property Project Proceedings 1994.
R. C. Dixon, Spread Spectrum Systems, John Wiley & Sons Inc. New York 1976.
S. K. Marvin, Spread Spectrum Handbook, McGraw-Hill, Inc. New York 1985.
G. B. Rhoads, Method and apparatus responsive to a code signal conveyed through a graphic image, U.S. Patent No. 5,710,834 1995.
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” NECI Technical Report 95-10, NEC Research Institute, Princeton, NJ 1995.
A. V. Drake, Fundamentals of Applied Probability, McGraw-Hill, Inc., New York 1967.
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Datahiding,” IBM Systems Journal 35 3&4 1996.
W. Bender, D. Gruhl, and N. Morimoto, Method and Apparatus for Data Hiding in Images, U.S. Patent No. 5,689,587 1996.
“Fundamental Facts About Money,” Federal Reserve Bank of Atlanta, http://www.frbatlanta.org/publica/brochure/fundfac/money.htm 1997.
“Genuine or Counterfeit?,” Federal Reserve Bank of Atlanta, http://www.frbatlanta.org/publica/brochure/counter/counterf.htm 1997.
“Currency Page,” The Department of the Treasury, http://www.treas.gov/whatsnew/newcur/currency.html 1997.
“Ink-jet counterfeiting on the rise, ” Reuters, http://www.zdnet.com/zdnn/content/reut/0401/302907.html April 1, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gruhl, D., Bender, W. (1998). Information Hiding to Foil the Casual Counterfeiter. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_1
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive